Tag: GreyNoise
-
Slashdot: ASUS Router Backdoors Affect 9,000 Devices, Persists After Firmware Updates
Source URL: https://it.slashdot.org/story/25/05/29/2052229/asus-router-backdoors-affect-9000-devices-persists-after-firmware-updates?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: ASUS Router Backdoors Affect 9,000 Devices, Persists After Firmware Updates Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant security issue involving the compromise of thousands of ASUS routers with malware-free backdoors, which could enable the establishment of a botnet. The report highlights the sophisticated…
-
The Register: More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
Source URL: https://www.theregister.com/2025/04/25/more_ivanti_attacks_may_be/ Source: The Register Title: More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans Feedly Summary: GreyNoise says it is the kind of activity that typically precedes new vulnerability disclosures Ivanti VPN users should stay alert as IP scanning for the vendor’s Connect Secure and…
-
The Register: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
Source URL: https://www.theregister.com/2025/02/28/cisa_kev_list_ransomware/ Source: The Register Title: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature Feedly Summary: 1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware…
-
Hacker News: Defending the Tor network: Mitigating IP spoofing against Tor
Source URL: https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/ Source: Hacker News Title: Defending the Tor network: Mitigating IP spoofing against Tor Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text outlines a recent coordinated IP spoofing attack targeting the Tor network. It describes how relay operators faced abuse complaints due to spoofed connections that mimicked unauthorized port scanning,…
-
Hacker News: Ping Storms at GreyNoise
Source URL: https://darthnull.org/noisestorms/ Source: Hacker News Title: Ping Storms at GreyNoise Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a detailed account of exploring and analyzing background noise data obtained from GreyNoise, focusing on its usage of ICMP packets. The author uncovers potential covert communication techniques using network packet analysis, leading…